Blog Post

Azure Database Support Blog
3 MIN READ

Understanding Azure SQL Data Sync Firewall Requirements

Mohamed_Baioumy_MSFT's avatar
Mar 30, 2026

Why IP Whitelisting Is Required and What Customers Should Know

Azure SQL Data Sync is commonly used to synchronize data between on‑premises SQL Server databases and Azure SQL Database. While the setup experience is generally straightforward, customers sometimes encounter connectivity or configuration issues that are rooted in network security and firewall behavior.

This blog explains why Azure SQL Data Sync requires firewall exceptions, what type of IP addresses may appear in audit logs, and how to approach this topic from a security and documentation standpoint—based on real troubleshooting discussions within the Azure SQL Data Sync ecosystem.

The Scenario: Sync Agent Configuration Fails Despite Valid Setup

A frequently reported issue occurs when the Azure SQL Data Sync Agent (installed on an on‑premises server) fails to save its configuration. The error typically indicates that a valid agent key is required—even when:

  • The agent key was freshly generated from the Azure SQL Data Sync portal
  • Connection tests succeed
  • The agent has been reinstalled or the server restarted
  • New sync groups were created

Despite these efforts, synchronization does not proceed until a specific public IP address is allowed through the Azure SQL Database firewall.

Why Firewall Rules Matter for Azure SQL Data Sync

Azure SQL Database is protected by a server‑level firewall that blocks all inbound traffic by default. Any external client—including the Data Sync Agent—must be explicitly allowed to connect.

In Azure SQL Data Sync:

  • The Data Sync Agent runs on‑premises
  • It connects outbound over TCP port 1433
  • It uses the public endpoint of the Azure SQL logical server
  • The Azure SQL firewall must allow the public IP address used by the agent

If this IP is not allowed, the agent cannot complete configuration or perform synchronization operations—even if authentication and permissions are otherwise correct.

Identifying the Required IP Address

In the referenced discussion, the required IP address was identified by reviewing Azure SQL audit logs, which revealed connection attempts being blocked at the firewall layer. Once this IP address was added to the Azure SQL server firewall rules, synchronization completed successfully.

This highlights an important point:

Audit logs can be a reliable way to identify which IP address must be whitelisted when Data Sync connectivity fails.

Is This IP Address Owned by Microsoft? Can It Change?

A natural follow‑up question is whether the observed IP address is Microsoft‑owned, and whether it can change.

From the discussion:

  • Azure SQL Data Sync relies on Microsoft‑managed service infrastructure
  • Some outbound connectivity may originate from Azure service IP ranges
  • Microsoft publishes official IP ranges and service tags for transparency

However, documentation does not guarantee that a single static IP will always be used. Customers should therefore treat firewall configuration as a network security requirement, not a one‑time exception.

Related Microsoft Resources

While Azure SQL Data Sync documentation focuses on setup and troubleshooting, firewall requirements are often implicit rather than explicitly called out.

The following Microsoft resources were referenced in the discussion to help customers understand Azure service IP ownership and ranges:

These resources can help security teams validate Microsoft‑owned IPs and plan firewall policies accordingly.

Key Takeaways for Customers

  • ✅ Azure SQL Data Sync requires firewall access to Azure SQL Database
  • ✅ The public IP used by the Data Sync Agent must be explicitly allowed
  • ✅ Audit logs are useful for identifying blocked IPs
  • ✅ IP addresses may belong to Microsoft infrastructure and can change over time
  • ✅ Firewall configuration is a security prerequisite, not an optional step

Closing Thoughts

Azure SQL Data Sync operates securely by design, leveraging Azure SQL Database firewall protections. While this can introduce configuration challenges, understanding the network flow and firewall requirements can significantly reduce setup friction and troubleshooting time.

If you're implementing Azure SQL Data Sync in a locked‑down network environment, we recommend involving your network and security teams early and validating firewall rules as part of the initial deployment checklist.

 

Published Mar 30, 2026
Version 1.0
No CommentsBe the first to comment